Cynthia Brumfield

Cynthia Brumfield is a veteran communications and technology analyst who is currently focused on cybersecurity. She runs a cybersecurity news destination site, Metacurity.com.

Deloitte: 8 things municipal governments can do about ransomware

Deloitte: 8 things municipal governments can do about ransomware

Deloitte researchers explain why state and local governments are favored for ransomware attacks and how they can protect themselves with limited resources.

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

New bipartisan US legislation to fight online child exploitation incentivizes companies to drop end-to-end encryption, critics say.

Authentication, identity management start-ups lead 2019 VC investing

Authentication, identity management start-ups lead 2019 VC investing

Cybersecurity venture investments reached nearly $7 billion in 2019. Authentication and identity management start-ups were the top lures.

5G security is a mess. Could digital certificates help?

5G security is a mess. Could digital certificates help?

5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages.

Presidential campaigns taking email security more seriously--not so much at the local level

Presidential campaigns taking email security more seriously--not so much at the local level

DMARC now protects the email domains for most U.S. presidential candidates, according to a new report, but local election bodies lag behind and are vulnerable to spoofing.

US elections remain vulnerable to attacks, despite security improvements

US elections remain vulnerable to attacks, despite security improvements

Continued Russian interference, insecure paperless voting processes will sow doubt about the next election despite some security improvements.

2020 outlook for cybersecurity legislation

2020 outlook for cybersecurity legislation

Here's a rundown of all the security-related bills working their way through this year's U.S. Congress, plus some hot security topics likely to be debated.

High-profile departures widen federal government’s security talent shortage

High-profile departures widen federal government’s security talent shortage

Recent key departures--voluntary and forced--might make it harder for government agencies to find the talent needed to fulfill their security missions.

The race for quantum-proof cryptography

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research.

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear.

Global threat groups pose new political and economic dangers

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts.

Russia’s Sandworm hacking group heralds new era of cyber warfare

Russia’s Sandworm hacking group heralds new era of cyber warfare

In-depth research on Sandworm shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world.

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.

US Department of Justice push for encryption backdoors might run afoul of First Amendment

US Department of Justice push for encryption backdoors might run afoul of First Amendment

Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections.

Cell phones don't belong in SCIFs, says Republican congressman

Cell phones don't belong in SCIFs, says Republican congressman

Rep. Mike Rogers says his phone was infected by Russian malware three years ago. Also, why he believes we need fewer federal cybersecurity agencies and election laws.

How enterprises can benefit from Cybersecurity Awareness Month

How enterprises can benefit from Cybersecurity Awareness Month

Organizations are working with the US Department of Homeland Security to enhance their own security awareness training and promote it in their communities.

Justice Department takes another run at encryption backdoors with ‘lawful access’

Justice Department takes another run at encryption backdoors with ‘lawful access’

Law enforcement officials and experts on the distribution of child pornography gathered on Friday to make the emotional, if not technological, case that tech companies should open up their encryption schemes to police investigating...

CISA’s Krebs seeks more measured approach to election security heading into 2020

CISA’s Krebs seeks more measured approach to election security heading into 2020

The Cybersecurity and Infrastructure Security Agency director says overhyped concern is a problem, while election officials say they reap the benefits of improved communications.

Senator Warner seeks

Senator Warner seeks "grand alliance" to protect against surveillance threat from China’s tech dominance

The senator believes Chinese companies will be required to aid surveillance of the US, especially as 5G networks roll out.

Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Director Anne Neuberger says her group will focus on ransomware, threats to US elections, and nation-state influence operations.

Load More